Updated the status of ssl vpn products as vulnerable to lesser security risks updated the list of known cves related to shellshock issue.
Juniper ssl vpn appliance vulnerability.
Summary of clear choice test of juniper networks secure access ssl vpn appliance sa 6000.
Cross site scripting xss vulnerability in the ssl vpn uac web server in the juniper junos pulse secure access service ssl vpn devices with ive os 7 1 before 7 1r16 7 4 before 7 4r3 and 8 0 before 8 0r1 and the juniper junos pulse access control service devices with uac os 4 1 before 4 1r8 4 4 before 4 4r3 and 5 0 before 5 0r1.
The juniper networks sa6500 ssl vpn appliance successfully provided a less than 1 percent failure rate across all the tests in the series.
Junos os is not affected by cve 2016 0701 cve 2016 0800 cve 2016 2107 cve 2016 2176 cve 2016 2179 cve 2016 2181 cve 2016 6308 cve 2016 6309 and cve 2016 7052.
The instance of pulse secure formerly juniper networks junos pulse pulse connect secure ssl vpn running on the remote host is affected by a path traversal vulnerability.
Provided final solution for jsa strm series and solution for idp series.
Data sheet for juniper networks secure access ssl vpn appliance sa 6000 starting price.
Double free vulnerability can lead to dos or remote code execution due to the processing of a specific http message when icap redirect service is enabled cve 2020 1647 jsa11034.
Junos os is potentially affected by many of these issues.
Juniper networks sa2000 ssl vpn appliance welcome cgi cross site scripting edb id.
A remote unauthenticated attacker can exploit this issue via a specially crafted http request to access arbitrary files on the remote host.
It had a 99 87 percent success rate for sustaining from 7 112 to 10 668 tunnels for a period of two plus hours.
For immediate assistance jtac is available 24 hours a day by calling 888 314 jtac free north america or 1 408 745 9500.
Cve 2016 2176 is a vulnerability that only affects ebcdic systems.
Provided solution for nsm appliances and junos space.